Intrusion Detection Systems mailing list archives
RE: Assessment tools/Scanners
From: broyds () home com (Bill Royds)
Date: Mon, 11 Oct 1999 15:01:01 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -----Original Message----- From: owner-ids () uow edu au [mailto:owner-ids () uow edu au]On Behalf Of Greg Shipley Sent: Monday, October 11, 1999 06:46 To: Vin McLellan Cc: Dug Song; Ryan M. Ferris; ids () uow edu au Subject: Re: IDS: Assessment tools/Scanners On Sun, 10 Oct 1999, Vin McLellan wrote: > How does one develop a test suite that will identify the Failure > when an IDS module does not identify the threat behind a novel attack? (Or > an old attack presented in a novel manner?) *snip* Wow - there are about a billion GOOD questions in here - enough to spawn off at least a dozen sub-threads. I'll try to throw some opinions out here, maybe some of them will help....maybe not....dunno.... - ---------------------- Given that there are two kinds of Intrusions, Network and Host Intrusions, there are 2 kinds of failures of Intrusion Detection. The first is failing to detect an authorised access to a network (packets not part of legitimate traffic). The second is failing to detect unauthorised usage of a host. For a network, there is a hierarchy of possible attacks. Given packets on a network, are they 1: Invalid format that servers can't properly handle (bad combinations of flags, fragments with too large or too small packets etc.) One can systematically and exhaustively generate combinations of bad flags in test packets. one can also do case testing of overflows, underflows etc. 2: Valid format but for illegitimate services (Trojans, FTP PUT for restricted pages, disallowed access to data etc.). This can be handled by using a network security policy then systematically violating it. 3. Valid Format for valid services but with invalid authorisation. This is the hardest to detect because the IDS must have access to system security databases. A statistical approach might help here as well as signatures. Given a process on a host, there are also several kinds of general attack: 1: Illegitimate process (unauthorised user, unauthorised service) 2. Legitimate process but unauthorised data. 3. Legitimate process, legitimate data, unauthorised time or server. By looking at this hierarchy, you can categorise test cases and test results. A test suite should include attempts to create each of these anomalies to categorise strengths and weaknesses. Most exploits can be categorised in this way as well so one can extrapolate the IDS ability to detect anomalous behaviour. > With a rule-based system, how does one go beyond the list of known > attacks to alarm vulnerabilities as well as known threats? Just to clarify terminology - when you say "rules based" you are referring to the traditional "attack signature" model, and not something like ODS' CMDS, correct? That being the case, you can "judge" on a number of things, but they are HIGHLY dependent on the target audience. For example, some of the things I've been looking at are: - depth of signature-base (how much can it look for and spot?) - architecture (does it scale? How does management work?) - level of polish (I have yet to come up with a good way of saying this - basically, does it have a useful interface, does it supply good documentation, etc.) - capabilities (how customisable is it? Can it do packet re-assembly?) Now, those are things I think are important, but that might not hold true for everyone. Take something like Dragon - very easy to customise, and still very raw....but it works. Some people might not care that it doesn't have an attack-tree like display, or that the documentation for the attacks are in a separate file, etc. Others may require that the IDS snaps into HP OpenView. While other may want to puke at the thought of OpenView.....It all goes back to the question of what you need the IDS to do. But you are right, there are some common areas you can cover.... Another test of rules based IDS is to seed ordinary traffic with exploits to test whether the IDS can separate the wheat from the chaff. Too many false positives can create as much a problem sometimes as missing an intrusion. -----BEGIN PGP SIGNATURE----- Version: PGPfreeware 6.0.2i Comment: Bill Royds CAST iQA/AwUBOAIz7ccYG6mh8NzqEQLHxACg5RPQVykii2GjDr6yXncEY04fOEoAoJmJ w697LWmpTx6B0Mc25qgEpjZY =sGnJ -----END PGP SIGNATURE-----
Current thread:
- Re: Pricing intrusions, (continued)
- Re: Pricing intrusions Stuart Staniford-Chen (Oct 13)
- Re: Assessment tools/Scanners Greg Shipley (Oct 11)
- Re: Assessment tools/Scanners Martin Roesch (Oct 11)
- Re: Assessment tools/Scanners Greg Shipley (Oct 12)
- Re: Assessment tools/Scanners Martin Roesch (Oct 12)
- Re: Assessment tools/Scanners Dug Song (Oct 12)
- Re: Assessment tools/Scanners Martin Roesch (Oct 12)
- Introduction mcondy (Oct 12)
- Re: Assessment tools/Scanners Ryan M. Ferris (Oct 13)
- Re: Assessment tools/Scanners Martin Roesch (Oct 13)
- RE: Assessment tools/Scanners Bill Royds (Oct 11)
- Re: Assessment tools/Scanners Stuart Staniford-Chen (Oct 11)
- Re: Assessment tools/Scanners Greg Shipley (Oct 12)
